The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa.
Metrics
Affected Vendors & Products
References
History
Wed, 21 May 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 May 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa. | |
| Title | Splitit <= 4.2.8 - Missing Authorization to Multiple Administrative Actions | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-21T09:21:50.660Z
Updated: 2025-05-21T10:16:39.665Z
Reserved: 2025-04-29T23:43:47.744Z
Link: CVE-2025-4105
Updated: 2025-05-21T10:11:45.582Z
Status : Awaiting Analysis
Published: 2025-05-21T12:16:22.473
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-4105
No data.